Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following JK0-023 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-023 Exam Dumps - CompTIA Network+ certification

Go to page:
Question # 73

An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason?

A.

WEP's IV is too small.

B.

WEP uses RC4 which is easily accessible and not secure.

C.

WEP uses plain text.

D.

WEP is not well supported.

Full Access
Question # 74

Which of the following methods limits access to a network based on characteristics of the network card?

A.

IP filtering

B.

MAC filtering

C.

Port filtering

D.

Encryption

Full Access
Question # 75

Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?

A.

Channel bonding

B.

MIMO

C.

Spatial reuse

D.

20MHz channel spacing

Full Access
Question # 76

A number of remote users have reported being unable to securely log on to the company’s network. Upon speaking with some of the employees experiencing the issue, no changes were made to their configurations, usernames, or passwords. The technician establishes a theory that one of the VPN concentrators may be down. Which of the following should the technician do NEXT?

A.

Plan to reboot the concentrator as the potential solution

B.

Escalate the problem to management

C.

Continue to speak to users, questioning if changes have been made

D.

Test access to the concentrator to confirm the status

Full Access
Question # 77

Jeff, a company executive, has noticed that a wireless network signal from the company’s WAP can be seen in the company’s parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?

A.

Implement WEP encryption

B.

Decrease signal strength

C.

Change wireless channels

D.

Rotate the SSID daily

Full Access
Question # 78

Which of the following attack types is being used if the originating IP address has been spoofed?

A.

Ping flood

B.

Trojan

C.

Smurf

D.

Worm

Full Access
Question # 79

Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?

A.

DoS attack

B.

Man-in-the-middle attack

C.

Smurf attack

D.

Xmas attack

Full Access
Question # 80

A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?

A.

DoS

B.

Buffer overflow

C.

Dictionary file

D.

SQL injection

Full Access
Go to page: